[email protected] Detection & Clean crack/serial/keygen

[email protected] Detection & Clean is a small utility that can help you get rid of the malware infection.

The virus comes in the following format:

Download [email protected] Detection & Clean Crack

Software company
Rank 4.0
319 4.0
Crack size ~ 500KB
Downloads total 3931
Systems Win All

From: e-mail address of the infected sender or one of the following e-mail addresses:

"Anna" [email protected]

"JUDY" [email protected]

"Rita Tulliani" [email protected]

"Tina" [email protected]

"Kelly Andersen" [email protected]

" Andy" [email protected]

"Linda" [email protected]

"Mon S" [email protected]

"Joanna" [email protected]

"JESSICA BENAVIDES" [email protected]

"Administrator" [email protected]

"Admin" [email protected]

"Support" [email protected]

"Monika Prado" [email protected]

"Mary L. Adams" [email protected]

Subject: Empty or having the following content:

RE:

RE: [original subject]

Body: Empty

Attachment: The name of the attachement is formed using one of the following words:

fun

Humor

docs

info

Sorry_about_yesterday

Me_nude Card

SETUP

stuff

YOU_are_FAT!

HAMSTER

news_doc

New_Napster_Site

README

images

Pics

The extension of the attachment could be a combination of .MP3., .DOC., .ZIP., with .scr., .pif. or just .scr or .pif.

The worm is using the IFRAME vulnerability and it will be executed on computers with Outlook Express just by preview. Computers with security patch will be infected only by executing the attachment.

After execution the worm copies itself in Windows %System% directory under the kernel32.exe name, and it will drop the kdll.dll at the same location.

To ensure that it will be executed at restart it adds the following registry key:

[HKLMSoftwareMicrosoftWindowsCurrentVersionRunOnceKernel32]

with value kernel32.exe.

Then it will delete itself from the location where it was executed, and it will gather computer information (like User name, computer name, RAS information, passwords, so on) and sends it to the following e-mail address: [email protected]

The Worm has two methods of getting e-mail addresses:

It search them in *ht* and *.asp files in Internet Cache directory or it gets them with MAPI functions from e-mails received by the infected user.

It will not send itself twice to the same address because it keeps the already used e-mail addresses in %SYSTEM%PROTOCOL.DLL.

Comments

Nicole, 12 October 2018

спасибі за кряк для [email protected] Detection & Clean

Leave a comment

Your email will not be published. * Required